[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, 4.5.1 or 4.5.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly handle crafted XML data. Successful exploitation allows attackers to degrade the performance of a .NET-enabled website and disrupt the availability of applications that use Microsoft .NET Framework.

The host is installed with Microsoft XML Core Services 3.0 or on Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 5.0 on Microsoft Office 2007 SP2 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which explicitly allow the use of Secure Sockets ...

The host is installed with Microsoft XML Core Services 3.0 or on Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, 8.1, Server 2012 or Server 2012 R2 or Microsoft XML Core Services 5.0 on Microsoft Office 2007 SP2 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which explicitly allow the use of Secure Sockets ...

The host is installed with IBM Tivoli Directory Server (TDS) 6.1 before 6.1.0.47 or 6.2 before 6.2.0.22 or 6.3 before 6.3.0.11 and is prone to information disclosure vulnerability. A flaw is present in the application, which is caused by the use of NULL-MD5 and NULL-SHA ciphers in the default Transport Layer Security (TLS) configuration. Successful exploitation allows remote attackers to trigger u ...

The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains.

Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted Web page.

The DNS server in Microsoft Windows 2000 Server SP4, and Server 2003 SP1 and SP2, uses predictable transaction IDs when querying other DNS servers, which allows remote attackers to spoof DNS replies, poison the DNS cache, and facilitate further attack vectors.

The host is installed with Opera before 11.0 and is prone to an unspecified vulnerability. A flaw is present in the application. Specific details regarding the vulnerability have not been made public. Successful exploitation could allow an attacker to produce unknown impacts.

The host is installed with Oracle Java SE 5.0 Update 17 or earlier or 6 Update 12 or earlier and is prone to integer signedness error vulnerability. A flaw is present in the applications, which fails to properly handle crafted glyph descriptions in a Type1 font. Successful exploitation allows remote attackers to access files or execute arbitrary code.

The host is installed with Oracle Java SE 5 Update 17 or earlier, 6 Update 12 or earlier, 1.3.1_24 or earlier or 1.4.2_19 or earlier and is prone to unspecified vulnerability. A flaw is present in the applications, which fails to properly handle unknown vectors related to "deserializing applets". Successful exploitation allows remote attackers to execute arbitrary code.


Pages:      Start    1380    1381    1382    1383    1384    1385    1386    1387    1388    1389    1390    1391    1392    1393    ..   1502

© SecPod Technologies